Windows Defender hidden command for adware block

Windows 10 (Windows Defender) antivirus software seems to allow adware. Not for everyone:

A hidden setting intended for organizations and companies can enhance Windows Defender security by excluding adware, or PUP from potentially unwanted programs or as you otherwise want to name the particular garbage.Windows Defender

Adware software is usually contained in free software installers. It's technically not malware, but it often shows ads, tracks your browsing, and slows down your computer.

Malwarebytes programs also have a setting that prevents these "potentially unwanted programs." But let's go to Windows Defender. Microsoft Security may block these applications but does not do so by default.

Below we will see how to enable this setting with a PowerShell command (with administrator rights).

In search, type powershell and right-click on the icon to run as an administrator. Alternatively, press the two Windows + X keys together and go to "Windows PowerShell (Admin)."

Copy - paste the following command and press Enter:

Set-MpPreference -PUAProtection 1

Blocking for any crapware is now enabled. If you want to turn it off in the future, run the same command, replacing "1" with "0".

How to Check if Crapware Blocking is On

To check whether the block is enabled, you can run the two following commands in the PowerShell box.

Copy and paste the commands separately.

$ Preferences = Get-MpPreference
$ Preferences.PUAProtection

If you see "1" as a result, the block is activated. If you see "0", it is off.

Registration in via Email

Enter your email to subscribe to the email notification service for new posts.


Read them Technology News from all over the world, with the validity of

Follow us on Google News at Google news